IM Security Guidelines Sample Clauses

IM Security Guidelines. I shall be bound by any additional password or security documents, NT guidelines, UNIX guidelines, software licenses and IM security guidelines provided by Company. My signature below indicates my intent to be personally bound by this document. AGREED: Mail to: Company Representative Name Name: Listed In Section 21 Of The MSA Title: Date: MASTER SERVICES AGREEMENT REV.3 SCHEDULE C
AutoNDA by SimpleDocs
IM Security Guidelines. I shall be bound by any additional password or security documents, NT guidelines, UNIX guidelines, software licenses and IM security guidelines provided by Company. My signature below indicates my intent to be personally bound by this document. AGREED: Name:

Related to IM Security Guidelines

  • Policies, Guidelines, Directives and Standards Either the LHIN or the MOHLTC will give the HSP Notice of any amendments to the manuals, guidelines or policies identified in Schedule C. An amendment will be effective in accordance with the terms of the amendment. By signing a copy of this Agreement the HSP acknowledges that it has a copy of the documents identified in Schedule C.

  • Practice Guidelines 37.1. CONTRACTOR shall adopt practice guidelines (or adopt COUNTY’S practice guidelines) that meet the following requirements:

  • General Guidelines 1. Conduct yourself in a responsible manner at all times in the laboratory.

  • Use Guidelines 3.3.1. The JAGGAER Applications are provided to Client for use only as expressly set forth in the Agreement, and Client will not use the JAGGAER Applications in whole or in part for any other use or purpose. In particular, Client will not, and will not allow any third party to: (i) decompile, disassemble, reverse engineer or attempt to reconstruct, identify or discover any source code, underlying ideas, underlying user interface techniques or algorithms of the JAGGAER Applications by any means, or disclose any of the foregoing; (ii) except as expressly set forth in the Agreement, provide, rent, lease, lend, or use the JAGGAER Applications for timesharing, subscription, or service bureau purposes; (iii) sublicense, transfer or assign the JAGGAER Applications or any of the rights or licenses granted under the Agreement; or remove or obscure any trademark, product identification, proprietary marking, copyright or other notices provided with the JAGGAER Applications or related documentation.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Usage Guidelines A) Any public use of the Sprint Marks ("Use") must be follow Sprint's guidelines. Use of the Marks includes the following: . Broadcast (TV and Radio) . Print . Direct Mail . New Media (on-line, CD ROM, Internet, etc.) . Collateral Materials . Endorsements/Sponsorships . Use of Celebrities and/or Public Figures . Retail Packaging/Use with Third Parties

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • SUPPLIER STANDARDS OF CONDUCT Accenture is committed to conducting its business free from unlawful, unethical or fraudulent activity. Supplier will act in a manner consistent with the ethical and professional standards of Accenture as described in the Accenture Supplier Standards of Conduct, including prompt reporting of unlawful, fraudulent or unethical conduct. A copy of these standards can be found at xxxxxxxxx.xxx/xx- en/company-ethics-code.

  • Applicable Guidelines The Sentencing Guidelines to be considered in this case are those in effect at the time of sentencing. The following statements regarding the calculation of the Sentencing Guidelines are based on the Guidelines Manual currently in effect, namely the November 2011 Guidelines Manual.

  • Investment Guidelines In addition to the information to be provided to the Sub-Advisor under Section 2 hereof, the Trust or the Advisor shall supply the Sub-Advisor with such other information as the Sub-Advisor shall reasonably request concerning the Fund’s investment policies, restrictions, limitations, tax position, liquidity requirements and other information useful in managing the Fund’s investments.

Time is Money Join Law Insider Premium to draft better contracts faster.